CVE-2007-5730
QEMU Buffer overflow via crafted "net socket listen" option
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.
Un desbordamiento de búfer en la región heap de la memoria en QEMU versión 0.8.2, como es usado en Xen y posiblemente otros productos, permite a usuarios locales ejecutar código arbitrario por medio de datos diseñados en la opción "net socket listen", también se conoce como desbordamiento de pila "net socket" de QEMU. NOTA: algunas fuentes han usado el CVE-2007-1321 para referirse a este problema como parte de "NE2000 network driver and the socket code”, pero este es el identificador correcto para la vulnerabilidad de escucha de socket de red individual.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-10-30 CVE Reserved
- 2007-10-30 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://osvdb.org/42985 | Broken Link | |
http://secunia.com/advisories/25095 | Third Party Advisory | |
http://secunia.com/advisories/27486 | Third Party Advisory | |
http://secunia.com/advisories/29129 | Third Party Advisory | |
http://secunia.com/advisories/29963 | Third Party Advisory | |
http://taviso.decsystem.org/virtsec.pdf | Technical Description | |
http://www.attrition.org/pipermail/vim/2007-October/001842.html | Mailing List | |
http://www.securityfocus.com/bid/23731 | Third Party Advisory | |
http://www.vupen.com/english/advisories/2007/1597 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/38239 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/25073 | 2020-12-15 | |
http://www.debian.org/security/2007/dsa-1284 | 2020-12-15 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203 | 2020-12-15 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162 | 2020-12-15 | |
http://www.redhat.com/support/errata/RHSA-2008-0194.html | 2020-12-15 | |
https://access.redhat.com/security/cve/CVE-2007-5730 | 2008-05-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=360381 | 2008-05-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | 0.8.2 Search vendor "Qemu" for product "Qemu" and version "0.8.2" | - |
Affected
| in | Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | * | - |
Safe
|
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 3.1 Search vendor "Debian" for product "Debian Linux" and version "3.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 4.0 Search vendor "Debian" for product "Debian Linux" and version "4.0" | - |
Affected
|